Please use this identifier to cite or link to this item:
Exploring PRC's Concept of Cyber Sovereignty
|Keywords:||網路空間 ; 網路空間主權 ; 網路安全 ; 網路疆域 |
Cyberspace ; Cyber Sovereignty ; Cyber Security ; Cyber Territoriality
|Issue Date:||2020-11-17 16:28:14 (UTC+8)|
Given the number of cyber-attacks in recent years, it has been confirmed that cyber-attacks can cause a huge impact on a state's political, economic, and military aspects due to the fact that the state actors cannot exercise jurisdiction over cross-border data flows within the territories. A so-called Cyber-Security Law was therefore established by states to empower their governments to monitor the flow of data in order to safeguard the security of users and enterprises in the cyberspace, as well as to strengthen the information security protection of national critical infrastructures in the state. Therefore, the shaping of cyber sovereignty and the construction of data in localized management have become extremely important tools for preventing cyber conflicts and maintaining international peace. Technically, generating data can be managed locally so that personal, business, and national security can be protected. However, this study finds that, in terms of China's cyber sovereignty, since the ＂Cyber-Security Law＂ was promulgated in 2016, by law, the CCP has legitimacy to implement jurisdictions in internet users and telecom operators, and also shape cyber sovereignty into an isolated network from the world's networks. At the same time, the Chinese government has integrated its military and civilian networking industry to create a so-called cyber territoriality. Politically, it has had an impact on the current order in cyberspace. Economically, it may increase the cost of global network operators entering the Chinese mainland market, resulting in the formation of trade protection, which is not conducive to global economic development. In addition, when the national security department has obtained the source codes of foreign merchants entering the China's market, the department may use this information to facilitate the controlling and monitoring of information in other countries' networks and to create asymmetric operational advantages in the wartime. In conclusion, the strategic implication of China's cyber sovereignty is not only to strengthen the national cyber security, but also to realize the dream of great power and the dream of a powerful military.
|Relation:||中國大陸研究, 62(1), 67-100|
|Appears in Collections:||[中國大陸研究 TSSCI] 期刊論文|
Files in This Item:
All items in 學術集成 are protected by copyright, with all rights reserved.